Commit Graph

569 Commits

Author SHA1 Message Date
Shawn Yang
974850dca4 Change init.logging.rc sequence and modify SMLoging location
-Load blank init.logging.rc for user build
-Start SMLoging after PerMgr service running
-Change SMLoging location to /vendor/bin

Test: Verified in device by manually trigger SMLog

Change-Id: I622106e7a8023770bbe5ea4224ce2905c2647768
2017-03-24 17:54:28 -07:00
Badhri Jagan Sridharan
59414164c9 Merge "usb.rc: create common scripts for mukie/walleye" 2017-03-24 23:03:59 +00:00
Badhri Jagan Sridharan
ce7bf846be usb.rc: create common scripts for mukie/walleye
Creating a common script for M/W which would copied into target's
root as init.muskie.usb.rc or init.walleye.usb.rc. We can extend
this another level deeper if required.

Bug: 31947358
Change-Id: Ie10248ac4ba0f97c32de8758c89bd9b893615cda
2017-03-24 21:58:47 +00:00
Alex Klyubin
36d2527720 Switch to split SELinux policy
This switches this device from monolithic to split sepolicy.

Test: Device boots, dmesg says "SELinux: Loaded policy from
      /vendor/etc/selinux/precompiled_sepolicy" which means split
      SELinux policy is being used.
Bug: 35809750

Change-Id: I3bac7306313a0688eb80ee858a051282657919cd
2017-03-24 15:41:05 +00:00
vivek mehta
682e730dde audio: add usb tty support
- add usb tty mixer path to enable usb tty feature

Change-Id: Iff1da90e73491e3e40561125a1f54e290c80b71f
2017-03-23 10:55:57 -07:00
Sandeep Patil
5c713cd830 dumpstate: dump /proc/interrupts
default bugreport stops dumping /proc/interrupts but
devices still probably care about it.

Bug: 36486169

Change-Id: Ia498aa0925d7c5f892ee6a0de9a2a3479de945a4
Signed-off-by: Sandeep Patil <sspatil@google.com>
2017-03-22 13:23:26 -07:00
Shawn Yang
c9bb616ea9 Merge "Setup SMloging masks for Muskie/Walleye" 2017-03-20 16:28:55 +00:00
Thierry Strudel
68eed12f64 Don't enforce RESTRICT_VENDOR_FILES := all
To work around b/36413696 allow vendor files to be installed in system.

Change-Id: I4bd01c67f296fa11bbb5a8187fdd03d3480ac009
Signed-off-by: Thierry Strudel <tstrudel@google.com>
2017-03-19 20:47:48 -07:00
TreeHugger Robot
53578417e1 Merge "muskie: muskie/walleye overlay changes for auto-brightness" 2017-03-18 00:52:20 +00:00
Steve Pfetsch
27a52f0b0e muskie: muskie/walleye overlay changes for auto-brightness
Enabled the muskie/walleye-specific overlay directories and added
auto-brightness values for muskie and walleye in their respective
config.xml overlays.

Bug: 35415845
Test: Manually verified adaptive brightness works.
Change-Id: Iaa0eac94ef275817ae85e2ed809a2ba036dd84a8
2017-03-17 23:34:41 +00:00
Shawn Yang
48db8269b2 Setup SMloging masks for Muskie/Walleye
Bug: 35647551

Test: Make build for Muskie/Walleye verify logging.rc file loaded
correctly.

Change-Id: I9dad9d8bb530949731c087f98af9d917a433ee85
2017-03-17 16:09:27 -07:00
TreeHugger Robot
a2ed37d437 Merge "device-common: moving to wahoo kernel prebuilt" 2017-03-15 23:08:09 +00:00
Shawn Yang
4373bc2bfb Merge changes from topic 'smlog_htc'
* changes:
  dump state for Muskie/Walleye
  ril: Enable the feature of modem runtime QXDM log by default
2017-03-15 21:46:18 +00:00
Thierry Strudel
553765edce device-common: moving to wahoo kernel prebuilt
Change-Id: I37c24be9a6461417f0a2aa07f03d9404d9d30561
Signed-off-by: Thierry Strudel <tstrudel@google.com>
2017-03-15 14:20:07 -07:00
Shawn Yang
949c0f9b5c dump state for Muskie/Walleye
Change-Id: Ifcb7134a745475dd03ddd1bee71509a62a2a981
2017-03-14 16:57:33 -07:00
terry.cr_huang
e14f52d62a ril: Enable the feature of modem runtime QXDM log by default
Set the property persist.radio.smlog_switch to 1 to enable smlog by default

Bug: 35647551
Change-Id: I598cbab0abc2d7c78b4946d2f87b7af476a296cb
2017-03-14 16:55:32 -07:00
TreeHugger Robot
f886cc9976 Merge "audio: copy device specific audio xmls" 2017-03-14 22:54:42 +00:00
David Lin
1529a759a0 audio: copy device specific audio xmls
This fixes issue that Muskie/Walleye is not using their device specific
configs for audio.

Change-Id: I9175a2c6092e27d4b8640b242d68551280860180
Signed-off-by: David Lin <dtwlin@google.com>
2017-03-14 11:42:19 -07:00
Chris Fries
86d221b812 CleanSpec: Blow away system/ vendor/ for recent treble file moves
Stale libraries in system/ will eclipse new ones in vendor/ which
can cause things (HWComposer) to fail to start.  Let's big-bang
the initial cleanspec to deal with this.

Change-Id: Ie80d4dec404f95cc37a89bf00918331c01cb57fb
2017-03-13 13:12:46 -05:00
vincent_tew
f962a79d64 muskie: audio: Update audio table
1.Add usb routing in mixer_paths/audio_platform_info/ ACDB
 -Adding USB headset and USB headphones scenario
 -Correct voicecall headphone TX routing path to slimbus
2.Add TAS2557 EC ref routing in mixer_paths

Change-Id: I055571cf4502b68bf7938a099a724a746a0e955c
Signed-off-by: vincent_tew <vincent_tew@htc.com>
2017-03-10 19:34:50 -08:00
Thierry Strudel
00fbe98de7 aosp_muskie/asop_walleye: add Dialer app
Bug: 34738705
Change-Id: Ifb5705b50bf96858a4a56abc06b96fcd6c544d1b
Signed-off-by: Thierry Strudel <tstrudel@google.com>
2017-03-10 15:07:44 -08:00
Thierry Strudel
708ae13e39 define DEVICE_PACKAGE_OVERLAYS for muskie and walleye
Change-Id: I94385ece2d52083a2e014ea99fbd719db57a003a
Signed-off-by: Thierry Strudel <tstrudel@google.com>
2017-03-10 11:59:03 -08:00
Thierry Strudel
d635fccde2 Move common inherit-product to wahoo
Change-Id: Ia0c692b6dda860d2663af96a2fed82806381e604
Signed-off-by: Thierry Strudel <tstrudel@google.com>
2017-03-10 11:59:03 -08:00
Shawn Yang
b763f5e99c Merge "carrier related device overlay" 2017-03-09 18:56:53 +00:00
jasmine cha
ab5322f6ad audio: Update audio tables and set fluence config
[mixer_paths]
1.modify camcorder for WNR function

[audio_platform_info]
1.modify device name ID for used scenario

Change-Id: I0415196d420962c8f509f6216126665aa12ad992
Signed-off-by: jasmine cha <jasmine_cha@htc.com>
2017-03-07 16:25:23 -08:00
Thierry Strudel
6bcc7cb7a9 add back device-common.mk for muskie/walleye to share things
Change-Id: Ie754ffa678e8f604973125ed7a3c472d01586f95
2017-03-07 16:24:54 -08:00
Nick Desaulniers
3d04197d02 muskie: fbe: share fstab with wahoo
Bug: 34250938
Change-Id: I23c74d0e14b93ebb345b145a882ae129bc1a5540
2017-03-06 14:07:01 -08:00
Thierry Strudel
14876b88f0 Migrate common files to device/google/wahoo
Test: boot, basic functionality
Change-Id: I9edff53d7be158a60914335e755ded652d247db8
Signed-off-by: Thierry Strudel <tstrudel@google.com>
2017-03-05 13:18:44 -08:00
TreeHugger Robot
d949806cd4 Merge "Adding allow rules and file contexts to handle denials." 2017-03-04 23:37:53 +00:00
Max Bires
07eb4303e8 Adding allow rules and file contexts to handle denials.
Added lines address following denials:
denied { search } for pid=1184 comm="thermal-engine" name="uio"
dev="sysfs" ino=38350 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_uio:s0 tclass=dir

denied { open } for pid=1184 comm="thermal-engine" path="/sys/class/uio"
dev="sysfs" ino=38350 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_uio:s0 tclass=dir

denied { read } for pid=1184 comm="thermal-engine" name="uio"
dev="sysfs" ino=38350 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_uio:s0 tclass=dir

denied { write } for pid=977 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_generic_socket

denied { ioctl } for pid=778 comm="port-bridge" path="/dev/at_mdm0"
dev="tmpfs" ino=22203 ioctlcmd=c300 scontext=u:r:port-bridge:s0
tcontext=u:object_r:at_device:s0 tclass=chr_file

denied { open } for pid=689 comm="Binder:669_1"
path="/firmware/image/modem.b13" dev="sda7" ino=51
scontext=u:r:per_mgr:s0 tcontext=u:object_r:firmware_file:s0 tclass=file

denied { read } for pid=689 comm="Binder:669_1" name="modem.b13"
dev="sda7" ino=51 scontext=u:r:per_mgr:s0
tcontext=u:object_r:firmware_file:s0 tclass=file

denied { read } for pid=670 comm="sensors.qcom" name="subsys0"
dev="sysfs" ino=33249 scontext=u:r:sensors:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=lnk_file

denied { open } for pid=670 comm="sensors.qcom"
path="/sys/bus/msm_subsys/devices" dev="sysfs" ino=16197
scontext=u:r:sensors:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=dir

denied { read } for pid=670 comm="sensors.qcom" name="devices"
dev="sysfs" ino=16197 scontext=u:r:sensors:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { search } for pid=670 comm="sensors.qcom" name="msm_subsys"
dev="sysfs" ino=16195 scontext=u:r:sensors:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { setpcap } for pid=673 comm="tftp_server" capability=8
scontext=u:r:rfs_access:s0 tcontext=u:r:rfs_access:s0 tclass=capability

denied { read } for pid=669 comm="pm-service" name="subsys0" dev="sysfs"
ino=33249 scontext=u:r:per_mgr:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=lnk_file

denied { open } for pid=669 comm="pm-service"
path="/sys/bus/msm_subsys/devices" dev="sysfs" ino=16197
scontext=u:r:per_mgr:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=dir

denied { read } for pid=669 comm="pm-service" name="devices" dev="sysfs"
ino=16197 scontext=u:r:per_mgr:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { search } for pid=669 comm="pm-service" name="msm_subsys"
dev="sysfs" ino=16195 scontext=u:r:per_mgr:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { net_bind_service } for pid=688 comm="pm-service" capability=10
scontext=u:r:per_mgr:s0 tcontext=u:r:per_mgr:s0 tclass=capability

denied { search } for pid=918 comm="loc_launcher" name="mq" dev="sda43"
ino=622663 scontext=u:r:location:s0
tcontext=u:object_r:location_data_file:s0 tclass=dir

denied { write } for pid=918 comm="loc_launcher" name="mq" dev="sda43"
ino=622663 scontext=u:r:location:s0
tcontext=u:object_r:location_data_file:s0 tclass=dir

denied { add_name } for pid=918 comm="loc_launcher" name="location-mq-s"
scontext=u:r:location:s0 tcontext=u:object_r:location_data_file:s0
tclass=dir

denied { create } for pid=918 comm="loc_launcher" name="location-mq-s"
scontext=u:r:location:s0 tcontext=u:object_r:location_data_file:s0
tclass=sock_file

denied { setattr } for pid=918 comm="loc_launcher" name="location-mq-s"
dev="sda43" ino=622681 scontext=u:r:location:s0
tcontext=u:object_r:location_data_file:s0 tclass=sock_file

denied { read } for pid=680 comm="android.hardwar" name="u:obj
ect_r:keymaster_prop:s0" dev="tmpfs" ino=22587
scontext=u:r:hal_gatekeeper_default:s0 tcontext=u:object_r:keymaster_
prop:s0 tclass=file

denied { read } for pid=654 comm="sensors.qcom" name="name" dev="sysfs"
ino=33243 scontext=u:r:sensors:s0 tcontext=u:object_r:sysfs:s0
tclass=file

denied { open } for pid=654 comm="sensors.qcom"
path="/sys/devices/soc/soc:qcom,ipa_fws@1e08000/subsys0/name"
dev="sysfs" ino=33243 scontext=u:r:sensors:s0 tcontext=u:object_r:sys
fs:s0 tclass=file

denied  { mounton } for  pid=560 comm="init" path="/firmware"
dev="sda21" ino=25 scontext=u:r:init:s0
tcontext=u:object_r:firmware_file:s0 tclass=dir

denied { read } for pid=766 comm="gatekeeperd"
name="u:object_r:keymaster_prop:s0" dev="tmpfs" ino=22203
scontext=u:r:gatekeeperd:s0 tcontext=u:object_r:keymaster_prop:s0
tclass=file

denied { search } for pid=1156 comm="rild" name="netmgr" dev="tmpfs"
ino=22676 scontext=u:r:rild:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=dir

denied { search } for pid=1156 comm="rild" name="netmgr" dev="tmpfs"
ino=22704 scontext=u:r:rild:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=dir

denied { open } for pid=795 comm="gatekeeperd"
path="/dev/__properties__/u:object_r:keymaster_prop:s0" dev="tmpfs"
ino=18420 scontext=u:r:gatekeeperd:s0
tcontext=u:object_r:keymaster_prop:s0 tclass=file

denied  { write } for  pid=549 comm="ueventd" name="uevent" dev="sysfs"
ino=17842 scontext=u:r:ueventd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file

denied { open } for pid=661 comm="sensors.qcom"
path="/sys/devices/soc/soc:qcom,ipa_fws@1e08000/subsys0/name"
dev="sysfs" ino=33243 scontext=u:r:sensors:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file

denied { read } for pid=661 comm="sensors.qcom" name="name" dev="sysfs"
ino=33243 scontext=u:r:sensors:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file

denied { read } for pid=732 comm="netmgrd" name="name" dev="sysfs"
ino=33243 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file

denied { open } for pid=732 comm="netmgrd"
path="/sys/devices/soc/soc:qcom,ipa_fws@1e08000/subsys0/name"
dev="sysfs" ino=33243 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=file

denied { open } for pid=732 comm="netmgrd"
path="/sys/devices/soc/cce0000.qcom,venus/subsys1/name" dev="sysfs"
ino=33290 scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs:s0
tclass=file

denied { create } for pid=732 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_generic_socket

denied { bind } for pid=732 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_generic_socket

Bug: 34784662
Test: The above denials are no longer present during boot
Change-Id: I6bccebf51e4b9e6cefda6bbe2331d7216632d1e3
2017-03-04 14:29:29 -08:00
Vineeta Srivastava
75646ac8e5 Merge "Fix QC proprietary path" 2017-03-04 06:55:05 +00:00
TreeHugger Robot
8673bdb7e5 Merge "Enable and binderize gralloc hal" 2017-03-03 23:26:47 +00:00
Shawn Yang
9149966b19 carrier related device overlay
Change-Id: I2842e910ccc7f8a50582fb5304fc90df1b5a5df4
2017-03-03 14:41:54 -08:00
Chia-I Wu
51b89c489b Enable and binderize gralloc hal
Bug: 35809668
Test: boots
Change-Id: I3a024ed6561b520080b703529f1e6c101826cd20
2017-03-03 14:06:50 -08:00
TreeHugger Robot
a3738b6cd8 Merge "Enforce privapp-permissions" 2017-03-03 20:06:27 +00:00
TreeHugger Robot
543ee2ffc7 Merge "audio: enable usb audio tunnel support" 2017-03-02 22:50:38 +00:00
Yifan Hong
518bdd905c Merge "vintf.xml => manifest.xml." 2017-03-02 20:03:14 +00:00
Vineeta Srivastava
6d054c01b0 Fix QC proprietary path
Test: build muskie
Change-Id: If88712bfbb029efa27293e30eb94a1015f89b62b
2017-03-01 20:35:54 -08:00
David Lin
6616d417ce audio: enable usb audio tunnel support
Bug: 33030406
Test: audio playback and record over usb-headset

Change-Id: Id44b212d6edcc7c7d876b55677731b7cb0644f9a
Signed-off-by: David Lin <dtwlin@google.com>
2017-03-01 19:46:51 -08:00
Yifan Hong
109edcc2ec vintf.xml => manifest.xml.
Bug: 35870239
Test: m installed-file-list -j64
Change-Id: I6837924cfae732b084d25660e9ea761b453be7f9
2017-03-01 17:58:22 -08:00
Andres Oportus
873500153f Enable sched governor (schedfreq)
Bug: 32492390

Signed-off-by: Andres Oportus <andresoportus@google.com>
2017-03-02 01:37:07 +00:00
TreeHugger Robot
abe680573f Merge "Remove references to non-existent dhcpcd" 2017-03-02 01:32:06 +00:00
Erik Kline
985b903213 Remove references to non-existent dhcpcd
Test: presubmit
Bug: 19704592
Bug: 35886671
Change-Id: Id87ac71c921edac095860b82af303d3b334d712f
2017-03-02 09:39:23 +09:00
Max Bires
d03132d274 Adding rules and contexts to fix more denials.
Fixing following denials:
denied { getattr } for pid=875 comm="thermal-engine"
path="/sys/devices/soc/0.qcom,rmtfs_sharedmem/uio/uio0/name" dev="sysfs"
ino=38372 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_rmtfs:s0 tclass=file

denied { open } for pid=875 comm="thermal-engine"
path="/sys/devices/soc/0.qcom,rmtfs_sharedmem/uio/uio0/name" dev="sysfs"
ino=38372 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_rmtfs:s0 tclass=file

denied { read } for pid=875 comm="thermal-engine" name="name"
dev="sysfs" ino=38372 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_rmtfs:s0 tclass=file

denied { read } for pid=875 comm="thermal-engine" name="uio0"
dev="sysfs" ino=38371 scontext=u:r:thermal-engine:s0
tcontext=u:object_r:sysfs_uio:s0 tclass=lnk_file

denied { block_suspend } for pid=873 comm="thermal-engine" capability=36
scontext=u:r:thermal-engine:s0 tcontext=u:r:thermal-engine:s0
tclass=capability2

denied { write } for pid=986 comm="rmt_storage"
scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=socket

denied { read } for pid=672 comm="rmt_storage"
scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=socket

denied { getattr } for pid=791 comm="netmgrd"
path="/sys/module/tcp_cubic/parameters/hystart_detect" dev="sysfs"
ino=25096 scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs:s0
tclass=file

denied { open } for pid=791 comm="netmgrd"
path="/sys/module/tcp_cubic/parameters/hystart_detect" dev="sysfs"
ino=25096 scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs:s0
tclass=file

denied { write } for pid=791 comm="netmgrd" name="hystart_detect"
dev="sysfs" ino=25096 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs:s0 tclass=file

denied { ioctl } for pid=763 comm="netmgrd" path="socket:[1767]"
dev="sockfs" ino=1767 ioctlcmd=c304 scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=socket

denied { ioctl } for pid=908 comm="rild" path="socket:[25980]"
dev="sockfs" ino=25980 ioctlcmd=c304 scontext=u:r:rild:s0
tcontext=u:r:rild:s0 tclass=socket

denied { open } for pid=676 comm="servicemanager"
path="/proc/783/attr/current" dev="proc" ino=25112
scontext=u:r:servicemanager:s0 tcontext=u:r:rild:s0 tclass=file

denied { getattr } for pid=676 comm="servicemanager"
scontext=u:r:servicemanager:s0 tcontext=u:r:rild:s0 tclass=process

denied { read } for pid=676 comm="servicemanager" name="current"
dev="proc" ino=25112 scontext=u:r:servicemanager:s0 tcontext=u:r:rild:s0
tclass=file

denied { call } for pid=783 comm="rild" scontext=u:r:rild:s0
tcontext=u:r:servicemanager:s0 tclass=binder

denied { open } for pid=763 comm="netmgrd"
path="/sys/devices/soc0/soc_id" dev="sysfs" ino=50839
scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs_soc:s0 tclass=file

denied { read } for pid=763 comm="netmgrd" name="soc_id" dev="sysfs"
ino=50839 scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=file

denied { open } for pid=763 comm="netmgrd"
path="/sys/bus/msm_subsys/devices" dev="sysfs" ino=16197
scontext=u:r:netmgrd:s0 tcontext=u:object_r:sysfs_msm_subsys:s0
tclass=dir

denied { read } for pid=763 comm="netmgrd" name="devices" dev="sysfs"
ino=16197 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { search } for pid=763 comm="netmgrd" name="msm_subsys"
dev="sysfs" ino=16195 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs_msm_subsys:s0 tclass=dir

denied { create } for pid=672 comm="rmt_storage"
scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0 tclass=socket

denied { setuid } for pid=672 comm="rmt_storage" capability=7
scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0
tclass=capability

denied { net_bind_service } for pid=672 comm="rmt_storage" capability=10
scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0
tclass=capability

denied { setpcap } for pid=672 comm="rmt_storage" capability=8
scontext=u:r:rmt_storage:s0 tcontext=u:r:rmt_storage:s0
tclass=capability

denied { open } for pid=672 comm="rmt_storage"
path="/sys/kernel/debug/rmt_storage/rmts" dev="debugfs" ino=19673
scontext=u:r:rmt_storage:s0 tcontext=u:object_r:debugfs:s0 tclass=file

denied { write } for pid=672 comm="rmt_storage" name="rmts"
dev="debugfs" ino=19673 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:debugfs:s0 tclass=file

denied { open } for pid=672 comm="rmt_storage" path="/dev/block/sdd15"
dev="tmpfs" ino=22639 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:sdd_block_device:s0 tclass=blk_file

denied { read write } for pid=672 comm="rmt_storage" name="sdd15"
dev="tmpfs" ino=22639 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:sdd_block_device:s0 tclass=blk_file

denied { read } for pid=672 comm="rmt_storage" name="uio0" dev="sysfs"
ino=38371 scontext=u:r:rmt_storage:s0 tcontext=u:object_r:sysfs_uio:s0
tclass=lnk_file

denied { ioctl } for pid=671 comm="irsc_util" path="socket:[1213]"
dev="sockfs" ino=1213 ioctlcmd=c305 scontext=u:r:irsc_util:s0
tcontext=u:r:irsc_util:s0 tclass=socket

denied { create } for pid=671 comm="irsc_util" scontext=u:r:irsc_util:s0
tcontext=u:r:irsc_util:s0 tclass=socket

denied { open } for pid=672 comm="rmt_storage" path="/dev/block/sdf3"
dev="tmpfs" ino=22678 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:block_device:s0 tclass=blk_file

denied { read write } for pid=672 comm="rmt_storage" name="sdf3"
dev="tmpfs" ino=22678 scontext=u:r:rmt_storage:s0
tcontext=u:object_r:block_device:s0 tclass=blk_file

Test: The above denials are no longer present
Bug: 34784662
Change-Id: I79caf3bef228a1fd84f0f58d4274c2f6a668d203
2017-03-02 00:15:13 +00:00
TreeHugger Robot
0ec7641e74 Merge "Added allows to handle following bootup denials" 2017-03-01 20:00:44 +00:00
Yifan Hong
1588ea5629 Update for interface entry in VINTF.
Bug: 35219444
Test: pass
Change-Id: If55fbbfe5921094ce9bef129ba8b59e4ad0eaade
2017-02-28 20:44:58 -08:00
TreeHugger Robot
65efd88f4a Merge "Camera: Enable Treble passthrough mode." 2017-03-01 01:49:56 +00:00
Roshan Pius
6c0cc7e4ed Merge "muskie: Move wpa_supplicant to vendor partition" 2017-02-28 22:14:23 +00:00
TreeHugger Robot
f375bbd1b2 Merge "kernel-headers: use the ones from hardware/qcom/msm8998" 2017-02-28 20:46:53 +00:00
Max Bires
4213a37bf1 Added allows to handle following bootup denials
denials:
avc: denied { read write } for pid=1673 comm="android.hardwar"
name="qseecom" dev="tmpfs" ino=23078
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:tee_device:s0

denied { ioctl } for pid=769 comm="qti" path="socket:[19255]"
dev="sockfs" ino=19255 ioctlcmd=c302 scontext=u:r:qti:s0
tcontext=u:r:qti:s0 tclass=socket

denied { create } for pid=769 comm="qti" scontext=u:r:qti:s0
tcontext=u:r:qti:s0 tclass=socket

denied { create } for pid=767 comm="netmgrd"
name="netmgr_connect_socket" scontext=u:r:netmgrd:s0
tcontext=u:object_r:netmgrd_socket:s0 tclass=sock_file

denied { setattr } for pid=767 comm="netmgrd"
name="netmgr_connect_socket" dev="tmpfs" ino=22393
scontext=u:r:netmgrd:s0 tcontext=u:object_r:netmgrd_socket:s0
tclass=sock_file

denied { read } for pid=767 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_socket

denied { write } for pid=767 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_socket

denied { bind } for pid=767 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_socket

denied { create } for pid=767 comm="netmgrd" scontext=u:r:netmgrd:s0
tcontext=u:r:netmgrd:s0 tclass=netlink_socket

denied { getattr } for pid=823 comm="netmgrd"
path="/sys/devices/virtual/net/rmnet_data0/queues/rx-0/rps_cpus"
dev="sysfs" ino=56682 scontext=u:r:netmgrd:s0
tcontext=u:object_r:sysfs_net:s0 tclass=file

denied { getattr } for pid=823 comm="netmgrd"
path="/proc/sys/net/ipv6/conf/rmnet_data0/accept_ra" dev="proc"
ino=27240 scontext=u:r:netmgrd:s0 tcontext=u:object_r:proc_net:s0
tclass=file

denied { net_raw } for pid=1197 comm="iptables" capability=13
scontext=u:r:netmgrd:s0 tcontext=u:r:netmgrd:s0 tclass=capability

denied  { write } for  pid=547 comm="ueventd" name="uevent" dev="sysfs"
ino=21783 scontext=u:r:ueventd:s0
tcontext=u:object_r:sysfs_fingerprint:s0 tclass=file

denied  { write } for  pid=547 comm="ueventd" name="uevent" dev="sysfs"
ino=17707 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_rmtfs:s0
tclass=file

denied  { write } for  pid=547 comm="ueventd" name="uevent" dev="sysfs"
ino=50864 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_soc:s0
tclass=file

denied  { write } for  pid=547 comm="ueventd" name="uevent" dev="sysfs"
ino=38138 scontext=u:r:ueventd:s0 tcontext=u:object_r:sysfs_net:s0
tclass=file

denied  { create } for  pid=1 comm="init" name="sdcard"
scontext=u:r:init:s0 tcontext=u:object_r:tmpfs:s0 tclass=lnk_file

denied { read } for pid=1571 comm="android.hardwar"
name="soc:fp_fpc1020" dev="sysfs" ino=21863
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:sysfs_fingerprint:s0 tclass=dir

denied { open } for pid=1571 comm="android.hardwar"
path="/sys/devices/soc/soc:fp_fpc1020" dev="sysfs" ino=21863
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:sysfs_fingerprint:s0 tclass=dir

denied { search } for pid=1571 comm="android.hardwar"
name="soc:fp_fpc1020" dev="sysfs" ino=21863
scontext=u:r:hal_fingerprint_default:s0
tcontext=u:object_r:sysfs_fingerprint:s0 tclass=dir

denied { set } for property=persist.net.doxlat pid=749 uid=1001 gid=3003
scontext=u:r:netmgrd:s0 tcontext=u:object_r:default_prop:s0
tclass=property_service

denied { set } for property=sys.listeners.registered pid=612 uid=1000
gid=1000 scontext=u:r:tee:s0 tcontext=u:object_r:system_prop:s0
tclass=property_service

denied { set } for property=sys.keymaster.loaded pid=609 uid=1000
gid=1000 scontext=u:r:tee:s0 tcontext=u:object_r:system_prop:s0
tclass=property_service

Bug: 34784662
Test: The above denials are no longer present
Change-Id: I52434abc526f8458479cf4acd0ff967277887f49
2017-02-28 12:33:20 -08:00